Computer methodology

                                            Computer methodology:

The model methodology that is relevant to my project theme is CIA Triad.


                                         (    Drawing by the author using draw.io)

The methodology i have chosen is the CIA triad, which is especially used in information security and cyber security.

following are the methodologies for information security:

1. Confidentiality:

                              Confidentiality refers to the privacy of an organization's data. This frequently implies that only authorized persons and processes should have access to or edit data. For instance, when you log in, you are prompted to enter a password. If you haven't logged in in a while, you may be prompted to enter a code that was emailed to you or some other kind of verification like two-factor authentication.Confidentiality can be found in a variety of access control systems, such as two-factor authentication, passwordless sign-on, and other access restrictions, but it's not just about allowing authorised users in; it's also about keeping particular files inaccessible. Encryption assists organizations in protecting their data from both accidental disclosure and malicious attacks. ( Fasulo, 2023)

2. Availability:

                         Data should be accessible to authorized users at all times. This include maintaining systems, networks, and devices operational. For instance, You can access your account at any time, and you may even be able to contact customer service at any time of day or night. Availability is primarily about ensuring that your systems are up and running so that business may continue even if an assault occurs. For example, DDoS (Distributed Denial of Service) attacks rely on limited availability. As a result, implementing a DDoS response plan and redundancy in your systems is a good method to ensure availability. However, even in the absence of an assault, systems can fail and become unavailable, therefore load balancing and fault tolerance are methods of preventing system failure. ( Fasulo, 2023)

3. Integrity:

                     Data with integrity can be trusted. It should be kept in a correct state, where it cannot be tampered with, and it should be correct, authentic, and reliable. Data integrity ensures that your purchases are recorded in your account and that you can contact a representative if there is a discrepancy. Access control and encryption can also help to maintain data integrity, but there are many more techniques to safeguard data integrity from both threats and corruption. It can sometimes be as simple as a read-only file. It may also include hashing or data checksums, which allow data to be audited to guarantee it hasn't been tampered with. In some circumstances, integrity may be physically secured from outside sources that could corrupt it. ( Fasulo, 2023)

 REFERENCES: Fasulo, P. (2023) What is the CIA triad? definition, importance, & examples, SecurityScorecard. Available at: https://securityscorecard.com/blog/what-is-the-cia-triad// (Accessed: 03 June 2023).


Comments

Popular Posts